US20120236347A1 - Information processing apparatus, method for controlling information processing apparatus, and program - Google Patents
Information processing apparatus, method for controlling information processing apparatus, and program Download PDFInfo
- Publication number
- US20120236347A1 US20120236347A1 US13/418,249 US201213418249A US2012236347A1 US 20120236347 A1 US20120236347 A1 US 20120236347A1 US 201213418249 A US201213418249 A US 201213418249A US 2012236347 A1 US2012236347 A1 US 2012236347A1
- Authority
- US
- United States
- Prior art keywords
- job
- processing unit
- input
- unit
- main body
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F3/00—Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
- G06F3/12—Digital output to print unit, e.g. line printer, chain printer
- G06F3/1201—Dedicated interfaces to print systems
- G06F3/1223—Dedicated interfaces to print systems specifically adapted to use a particular technique
- G06F3/1237—Print job management
- G06F3/1238—Secure printing, e.g. user identification, user rights for device usage, unallowed content, blanking portions or fields of a page, releasing held jobs
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/606—Protecting data by securing the transmission between two devices or processes
- G06F21/608—Secure printing
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F3/00—Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
- G06F3/12—Digital output to print unit, e.g. line printer, chain printer
- G06F3/1201—Dedicated interfaces to print systems
- G06F3/1202—Dedicated interfaces to print systems specifically adapted to achieve a particular effect
- G06F3/1218—Reducing or saving of used resources, e.g. avoiding waste of consumables or improving usage of hardware resources
- G06F3/1221—Reducing or saving of used resources, e.g. avoiding waste of consumables or improving usage of hardware resources with regard to power consumption
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F3/00—Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
- G06F3/12—Digital output to print unit, e.g. line printer, chain printer
- G06F3/1201—Dedicated interfaces to print systems
- G06F3/1202—Dedicated interfaces to print systems specifically adapted to achieve a particular effect
- G06F3/1222—Increasing security of the print job
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F3/00—Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
- G06F3/12—Digital output to print unit, e.g. line printer, chain printer
- G06F3/1201—Dedicated interfaces to print systems
- G06F3/1223—Dedicated interfaces to print systems specifically adapted to use a particular technique
- G06F3/1229—Printer resources management or printer maintenance, e.g. device status, power levels
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F3/00—Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
- G06F3/12—Digital output to print unit, e.g. line printer, chain printer
- G06F3/1201—Dedicated interfaces to print systems
- G06F3/1278—Dedicated interfaces to print systems specifically adapted to adopt a particular infrastructure
- G06F3/1279—Controller construction, e.g. aspects of the interface hardware
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F3/00—Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
- G06F3/12—Digital output to print unit, e.g. line printer, chain printer
- G06F3/1201—Dedicated interfaces to print systems
- G06F3/1202—Dedicated interfaces to print systems specifically adapted to achieve a particular effect
- G06F3/1211—Improving printing performance
- G06F3/1212—Improving printing performance achieving reduced delay between job submission and print start
-
- Y—GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y02—TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
- Y02D—CLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
- Y02D10/00—Energy efficient computing, e.g. low power processors, power management or thermal management
Definitions
- the present invention relates to an information processing apparatus, a method for controlling an information processing apparatus, and a program.
- Some information processing apparatuses have a normal mode and a power saving mode as a power mode, and operate in either power mode according to a situation. For such information processing apparatuses, it is important to increase the time period for which the information processing apparatus can operate in the power saving mode as much as possible to keep power consumption low.
- Japanese Patent Application Laid-Open No. 2006-270538 discusses an invention relating to an information processing apparatus constituted by an apparatus main body and a network interface card (NIC), and configured in such a manner that power is supplied to the apparatus main body and the NIC in the normal mode, while power is supplied only to the NIC but is not supplied to the apparatus main body in the power saving mode.
- the NIC when a job is input during the power saving mode, the NIC performs proxy response processing, thereby maintaining the power saving mode of the information processing apparatus as long as possible.
- the proxy response processing means that, when a job is input during the power saving mode and this job is not required to be directly processed by the apparatus main body, the NIC processes this job on behalf of the apparatus main body while maintaining the power saving mode of the information processing apparatus.
- the information processing apparatus is transitioned from the power saving mode to the normal mode, thereby allowing the apparatus main body to directly process that job.
- the NIC side should decrypt the job first, and then perform proxy response processing. In this case, it can take a long time to decrypt the entire job, which inevitably leads to a delay in execution of proxy response processing. This problem becomes more noticeable when the decrypting capability of the NIC side is lower than the decrypting capability of the apparatus main body side.
- One aspect of the present invention is directed to enabling proxy response processing perform processing more quickly on an encrypted job.
- an information processing apparatus includes a first processing unit and a second processing unit.
- the information processing apparatus operates in a first power mode in which power is supplied to the first processing unit and the second processing unit, or in a second power mode in which power is not supplied to the first processing unit but is supplied to the second processing unit.
- the information processing apparatus includes an input unit configured to, when the information processing apparatus operates in the second power mode, input a job, a decryption unit configured to, when the input unit inputs an encrypted job, decrypt a header of the encrypted job without decrypting a main body of the encrypted job, a determination unit configured to determine whether the second processing unit should perform proxy response processing based on the header of the job, and a control unit configured to, in a case where the determination unit determines that the second processing unit should perform the proxy response processing, perform control such that the second processing unit processes the job input by the input unit without causing the information processing apparatus to transition from the second power mode to the first power mode, and configured to, in a case where the determination unit determines that the second processing unit should not perform the proxy response processing, perform control such that the first processing unit processes the job input by the input unit after causing the information processing apparatus to transition from the second power mode to the first power mode.
- FIG. 1 illustrates a system configuration
- FIG. 2 is a block diagram illustrating the configuration of a multi-function peripheral (MFP) 2 .
- MFP multi-function peripheral
- FIG. 3 is a flowchart illustrating processing to be performed by the MFP 2 .
- FIG. 4 is a flowchart illustrating the details of proxy response processing according to a first exemplary embodiment.
- FIG. 5 illustrates a data structure of a job.
- FIG. 6 is a table storing the correspondence relationship between job types and availability of the proxy response processing.
- FIG. 7 is a flowchart illustrating the details of proxy response processing according to a second exemplary embodiment.
- FIG. 8 is a flowchart illustrating the details of proxy response processing according to a third exemplary embodiment.
- an information processing apparatus is embodied by an MFP by way of example, but the information processing apparatus may be embodied by an apparatus that is not an MFP. Further, in the following description, an NIC is provided within the MFP, but the NIC may be provided outside the MFP.
- FIG. 1 illustrates a system configuration of the present exemplary embodiment.
- a system includes a personal computer (PC) 1 , an MFP 2 , and a local area network (LAN) 3 .
- the PC 1 generates a job, and then outputs the job to the MFP 2 .
- the MFP 2 inputs a job from the PC 1 , and then processes the job.
- the LAN 3 connects the PC 1 and the MFP 2 communicably to each other.
- FIG. 2 is a block diagram illustrating the configuration of the MFP 2 .
- the solid line indicates a data flow
- the broken line indicates a power flow.
- the MFP 2 includes an NIC 100 , an apparatus main body 200 , and a power source 300 .
- the NIC 100 includes components from a LAN interface 101 to a system bus 107 .
- the LAN interface 101 inputs data from and outputs data to the LAN 3 .
- a central processing unit (CPU) 102 (second processing unit) is in charge of control of the entire NIC 100 . To realize this control, the CPU 102 reads out a program stored in a read only memory (ROM) 106 into a random access memory (RAM) 103 , and then executes the program.
- the RAM 103 functions as, for example, a work area when the CPU 102 processes a job.
- An input/output (I/O) interface 104 inputs data from and outputs data into the apparatus main body 200 .
- a Mini Security Architecture for Internet Protocol (IP-Sec) 105 encrypts and decrypts data according to the IP-Sec method.
- IP-Sec Internet Protocol
- the present exemplary embodiment will be described assuming that the Mini IP-Sec 105 is a hardware apparatus, but the Mini IP-Sec 105 may be a program described as a software application, and may be realized when the CPU 102 executes the program.
- the ROM 106 stores, for example, a program to be executed by the CPU 102 .
- the system bus 107 connects the respective components of the NIC 100 to one another.
- the apparatus main body 200 includes components from an I/O interface 201 to a system bus 210 .
- the I/O interface 201 inputs data from and outputs data into the NIC 100 .
- a CPU 202 (first processing unit) is in charge of control of the entire apparatus main body 200 . To realize this control, the CPU 202 reads out a program stored in a ROM 207 or a hard disc drive (HDD) 204 into a RAM 203 , and then executes the program.
- a program stored in a ROM 207 or a hard disc drive (HDD) 204 into a RAM 203 , and then executes the program.
- HDD hard disc drive
- the RAM 203 functions as, for example, a work area when the CPU 202 processes a job.
- the HDD 204 stores, for example, an operating system (OS) and an application program that the CPU 202 executes. Further, the HDD 204 can also hold image data input by the LAN interface 101 and a reading unit 208 , and this image data can be output according to a user's instruction.
- a certain area in the storage area of the HDD 204 is designated to hold image data for a while, and this area is referred to as “BOX”. Further, the function of storing image data into the BOX or outputting image data selected by a user from the image data stored in the BOX is referred to as “BOX function”.
- An operation unit 205 includes a display unit and an input unit.
- the operation unit 205 provides an operation screen of the MFP 2 to a user with use of the display unit, and receives various kinds of operations that a user applies to the MFP 2 with use of the input unit.
- a Full IP-Sec 206 encrypts and decrypts data according to the IP-Sec method.
- the Full IP-Sec 2006 can encrypt and decrypt data more quickly than the Mini IP-Sec 105 does. Further, the Full-IP-Sec 206 consumes a larger amount of power than the Mini IP-Sec 105 . Further, the Full IP-Sec 206 supports a wider range of encryption and decryption methods than the Mini IP-Sec 105 .
- the present exemplary embodiment will be described assuming that the Full IP-Sec 206 is a hardware apparatus, but the Full IP-Sec 206 may be a program described as a software application, and may be realized when the CPU 202 executes the program.
- the ROM 207 stores, for example, a boot program to be executed by the CPU 202 .
- the reading unit 208 reads a document to input image data and stores the image data into the RAM 203 .
- a printing unit 209 prints data onto a sheet based on image data stored in the RAM 203 .
- a system bus 210 connects the respective components of the apparatus main body 200 to one another.
- a power source 300 supplies power to the NIC 100 and the apparatus main body 200 .
- the power source 300 switches the operation mode of the MFP 2 between a normal mode and a power saving mode according to the control of the CPU 102 and the CPU 202 .
- FIG. 3 is a flowchart illustrating the processing performed by the MFP 2 .
- the processing illustrated in FIG. 3 is executed by the CPU 202 when the MFP 2 operates mainly in the normal mode.
- the CPU 202 reads out the program stored in the HDD 204 into the RAM 203 to execute the program, so that the processing illustrated in FIG. 3 is realized.
- step S 101 the CPU 202 activates the MFP 2 when the CPU 202 receives an instruction to turn the power on from a user via the operation unit 205 .
- the MFP 2 starts operating in the normal mode.
- the MFP 2 operates in any of a plurality of power modes. Examples of the plurality of power modes include the normal mode (first power mode) and the power saving mode (second power mode).
- the normal mode is a power mode in which power is supplied to both the NIC 100 and the apparatus main body 200 .
- the power saving mode is a power mode in which power consumption is low compared to the normal mode, and power is supplied to the NIC 100 but is not supplied to the apparatus main body 200 . Further, as the power saving mode, there may be a power mode in which power supply is stopped to only a part of the apparatus main body 200 (the operation unit 205 , the reading unit 208 , and the printing unit 209 ), and power supply is continued to the rest of the apparatus main body 200 .
- the expression “power is not supplied” should be interpreted in abroad sense, and is intended to cover not only the condition that no power is supplied power, but also the condition that the supplied power is too low to allow execution of a normal operation.
- step S 102 the CPU 202 determines whether a job is input via the I/O interface 201 . If a job is input (YES in step S 102 ), the processing proceeds to step S 103 . If no job is input (NO in step S 102 ), the processing proceeds to step S 107 .
- step S 103 the CPU 202 determines whether the job input in step S 102 is encrypted. If the input job is encrypted (YES in step S 103 ), the processing proceeds to step S 104 . If the input job is not encrypted (NO in step S 103 ), the processing proceeds to step S 105 .
- step S 104 the CPU 202 decrypts the job input in step S 102 by controlling the Full IP-Sec 206 .
- the Full IP-Sec 206 entirely decrypts the input job.
- the Full IP-Sec 206 partially decrypts the input job.
- step S 105 the CPU 202 processes the job input in step S 102 .
- the CPU 202 performs the processing according to the type of the input job.
- step S 106 the CPU 202 determines whether the CPU 202 has received an instruction to turn the power off from the user via the operation unit 205 . If the CPU 202 has received an instruction to turn the power off from the user (YES in step S 106 ), the processing ends. If the CPU 202 has not received an instruction to turn the power off from the user (NO in step S 106 ), the processing proceeds to step S 102 .
- step S 107 the CPU 202 determines whether a predetermined time has passed, maintaining such a state that no job is input via the LAN interface 101 .
- step S 107 instead of making the above-described determination, the CPU 202 determines whether the CPU 202 has received an instruction to cause the MFP 207 to transit to the power saving mode from the user via the operation unit 205 . If the predetermined time has passed, maintaining such a state that no job is input (YES in step S 107 ), the processing proceeds to step S 108 . If the predetermined time has not passed, maintaining such a stat that no job is input (NO in step S 107 ), the processing proceeds to step S 102 .
- step S 108 the CPU 202 controls the power source 300 to cause the MFP 2 transition from the normal mode to the power saving mode.
- step S 109 during the power saving mode, the NIC 100 performs proxy response processing.
- the proxy response processing means that the CPU 102 responds to a job on behalf of the CPU 202 while the MFP 2 is operating in the power saving mode. The details of step S 109 is described below with reference to FIG. 4 .
- step S 110 the CPU 202 determines whether the CPU 202 has received an activation signal from the CPU 102 via the I/O interface 201 .
- the activation signal is a signal transmitted from the CPU 102 to the CPU 202 , and a signal for causing the MFP 2 to transition from the power saving mode to the normal mode.
- the CPU 102 controls the power source 300 , thereby arranging power to be supplied to at least the CPU 202 .
- the CPU 202 determines whether the CPU 202 has received an instruction to cause the MFP 2 to transition to the normal mode from the user via the operation unit 205 .
- step S 110 If the CPU 202 has received an activation signal from the CPU 102 (YES in step S 110 ), the processing proceeds to step S 111 . If the CPU 202 has not received an activation signal from the CPU 102 (NO in step S 110 ), the processing proceeds to step S 109 .
- step S 111 the CPU 202 controls the power source 300 to cause the MFP 2 to transition from the power saving mode to the normal mode.
- the processing of causing the MFP 2 to transition from the power saving mode to the normal mode includes, for example, the processing that the CPU 202 activates the respective components of the apparatus main body 202 .
- FIG. 4 is a flowchart illustrating the details of the proxy response processing according to the first exemplary embodiment.
- the processing illustrated in FIG. 4 is performed by the CPU 102 when the MFP 2 operates mainly in the power saving mode.
- the CPU 102 reads out the program stored in the ROM 106 into the RAM 103 to execute the program, so that the processing illustrated in FIG. 4 is realized.
- step S 201 the CPU 102 determines whether a job is input via the LAN interface 101 . If a job is input (YES in step S 201 ), the processing proceeds to step S 202 . If no job is input (NO in step S 201 ), the CPU 102 waits until a job is input.
- step S 202 the CPU 102 determines whether the job input in step S 201 is encrypted. If the input job is encrypted (YES in step S 202 ), the processing proceeds to step S 203 . If the input job is not encrypted (NO in step S 202 ), the processing proceeds to step 209 .
- step S 203 the CPU 102 controls the Mini IP-Sec 105 to decrypt the header of the job input in step S 201 .
- the Mini IP-Sec 105 does not decrypt the main body of the job.
- the header of the job is copied to the Mini IP-Sec 105 , which then decrypts this copy. Therefore, the original header of the job remains encrypted.
- FIG. 5 illustrates a data structure of a job.
- a job includes a header and a main body.
- the header contains, for example, information indicating the type of the job, and the main body contains, for example, image data required to execute the job.
- the header has a fixed data length, while the main body has a variable data length.
- the Mini IP-Sec 105 decrypts data from the beginning of the job to the position corresponding to a predetermined data length, thereby decrypting the header of the job.
- step S 204 the CPU 102 determines whether the job input in step S 201 is a job that the NIC 100 can respond to by proxy based on the information indicating the type of the job, which is contained in the header of the job decrypted in step S 203 . If the input job is a job that the NIC 100 can respond to by proxy (YES in step S 204 ), the processing proceeds to step S 205 . If the input job is not a job that the NIC 100 can respond to by proxy (NO in step S 204 ), the processing proceeds to step S 207 .
- the MFP 2 can process a plurality of types of jobs.
- Examples of the plurality of types of jobs include an apparatus status check, a network connection response, Page Description Language (PDL) printing, and BOX remote access.
- the apparatus status check job is where the MFP 2 reports the current status of the MFP 2 (for example, presence or absence of an error, the remaining amount of toner, and the remaining amount of sheets) to the PC 1 in response to a request from the PC 1 .
- the network connection response job is where the MFP 2 notifies the PC 1 that the MFP 2 is connected to the LAN 3 at that time in response to a request from the PC 1 .
- the PDL printing job is where the MFP 2 controls the printing unit 209 to print data based on print data in the PDL format which is input from the PC 1 .
- the BOX remote access job is where the BOX is accessed by a remote operation from the PC 1 .
- Examples of jobs that remotely access the BOX include a job of storing image data into the BOX according to a remote operation from the PC 1 , and a job of printing data based on image data stored in the BOX according to a remote operation from the PC 1 .
- FIG. 6 is a table indicating the correspondence relationship between job types and availability of proxy response processing. This table is stored in the ROM 106 , and can be used by the CPU 102 . For example, the apparatus status check and network connection response jobs can be processed without use of the components of the apparatus main body 200 , and thereby allow the NIC 100 to take care of them by proxy response processing.
- the PDL printing and BOX remote access jobs cannot be processed without use of the components of the apparatus main body 200 , and thereby do not allow the NIC 100 to take care of them by proxy response processing.
- the CPU 102 refers to the table illustrated in FIG. 6 to specify availability of proxy response processing from the job type, and thereby determines whether the input job is a job that the NIC 100 can respond to by proxy response processing.
- step S 205 the CPU 102 controls the Mini IP-Sec 105 to decrypt the main body of the job input in step S 201 . At this time, the CPU 102 does not decrypt the header of the input job.
- step S 206 the CPU 102 processes the job input in step S 201 .
- the CPU 102 performs the processing according to the type of the input job based on the information indicating the job type which is contained in the job header decrypted in step S 203 . Further, at this time, the CPU 102 processes the input job with use of the data contained in the job main body decrypted in step S 205 .
- step S 207 the CPU 102 transmits an activation signal to the CPU 202 via the I/O interface 104 .
- step S 208 the CPU 102 transmits the job input in step S 201 to the apparatus main body 200 via the I/O interface 104 .
- the CPU 102 does not overwrite the header and main body of the job with the decrypted data, and therefore both the header and main body of the job transmitted to the apparatus main body 200 are data remaining encrypted.
- step S 209 the CPU 102 determines whether the job input in step S 201 is a job that the NIC 100 can respond to by proxy response processing based on the information indicating the job type contained in the header of the job input in step S 201 .
- the CPU 102 also refers to the table illustrated in FIG. 6 to specify availability of proxy response processing from the job type, and thereby determines whether the input job is a job that the NIC 100 can respond to by proxy response processing. If the input job is a job that the NIC 100 can respond to by proxy response processing (YES in step S 209 ), the processing proceeds to step S 210 . If the input job is not a job that the NIC 100 can respond to by proxy response processing (NO in step S 209 ), the processing proceeds to step S 211 .
- step S 210 the CPU 102 processes the job input in step S 201 .
- the CPU 102 performs the processing according to the type of the input job based on the information indicating the job type, which is contained in the header of the job input in step S 201 . Further, at this time, the CPU 102 processes the input job with use of the data contained in the main body of the job input in step S 201 .
- step S 211 the CPU 102 transmits an activation signal to the CPU 202 via the I/O interface 104 .
- step S 212 the CPU 102 transmits the job input in step S 201 to the apparatus main body 200 via the I/O interface 104 .
- Step S 212 is performed after the CPU 202 has completed its activation in response to the activation signal. Further, in the job data transmitted to the apparatus main body 200 in step S 212 , both the header and main body are unencrypted data.
- the NIC 100 when an encrypted job is input while the MFP 2 is operating in the power saving mode, the NIC 100 decrypts only the header of the job to determine availability of proxy response processing. As a result, the NIC 100 can perform proxy response processing on the encrypted job at a higher speed and with a lighter processing load, compared to the processing speed and load when the NIC 100 decrypts the entire job to determine availability of proxy response processing.
- step S 208 the NIC 100 transmits a job containing both the header and main body remaining encrypted to the apparatus main body 200 .
- step S 208 the NIC 100 transmits a job in which the header is decrypted and the main body remains encrypted, to the apparatus main body 200 .
- the basic configuration of the present exemplary embodiment is similar to the first exemplary embodiment described with reference to FIGS. 1 to 6 , and therefore the description thereof will be omitted here.
- FIG. 7 is a flowchart illustrating the details of the proxy response processing according to the second exemplary embodiment.
- steps similar to those illustrated in FIG. 4 are indicated by the same step numbers, and the descriptions thereof will be omitted here.
- a difference between FIG. 7 and FIG. 4 is the addition of step S 301 between step S 207 and step S 208 .
- step S 301 the CPU 102 overwrites the header of the job input in step S 201 with the data decrypted in step S 203 .
- step S 208 the CPU 102 outputs the job data with only the header thereof decrypted. Therefore, in step S 104 , the CPU 202 only has to decrypt the main body of the job.
- the present exemplary embodiment may be configured in such a manner that overwriting the header of a job is performed only when the time required to cause the MFP 2 to transit from the power saving mode to the normal mode is longer than the time required to overwrite the header of the job.
- the time required for the MFP 2 to transition from the power saving mode to the normal mode, and the time required to overwrite the header of the job are stored in advance or estimated each time.
- the CPU 202 does not have to decrypt the header of the job after the MFP 2 transitions to the normal mode, so that the CPU 202 can process the job at a higher speed and with a lighter processing load compared to the first exemplary embodiment.
- step S 208 the NIC 100 transmits a job with both the header and main body thereof remaining encrypted to the apparatus main body 200 .
- step S 208 the NIC 100 transmits a job in which both the header and the main body are decrypted to the apparatus main body 200 .
- the basic configuration of the present exemplary embodiment is similar to the first exemplary embodiment described with reference to FIGS. 1 to 6 , and therefore the description thereof will be omitted here.
- FIG. 8 is a flowchart illustrating the details of the proxy response processing according to the third exemplary embodiment.
- steps similar to those in FIG. 4 are indicated by the same step numbers, and the descriptions thereof will be omitted here.
- a difference between FIG. 8 and FIG. 4 is the addition of steps S 401 and S 402 between steps S 207 and S 208 .
- step S 401 the CPU 102 controls the Mini IP-Sec 105 to decrypt the main body of the job input in step S 201 .
- the main body of the job is copied to the Mini IP-Sec 105 , which then decrypts this copy. Therefore, the original main body of the job remains encrypted.
- step S 402 the CPU 102 overwrites the header of the job input in step S 201 with the data decrypted in step S 203 , and overwrites the main body of the job input in step S 201 with the data decrypted in step S 401 .
- step S 208 the CPU 102 outputs the job data with both the header and main body thereof decrypted. Therefore, in step S 104 , the CPU 202 does not have to decrypt the job.
- the present exemplary embodiment may be configured in such a manner that decrypting and overwriting the main body of a job is performed only when the time required for the MFP 2 to transition from the power saving mode to the normal mode is longer than the time required to decrypt and overwrite the main body of the job.
- the time required for the MFP 2 to transition from the power saving mode to the normal mode, and the time required to decrypt and overwrite the main body of the job are stored in advance or estimated each time.
- the CPU 202 does not have to decrypt the header and main body of the job after the power mode of the MFP 2 is caused to transit to the normal mode, so that the CPU 202 can process the job at a higher speed and with a lighter processing load compared to the first exemplary embodiment.
- aspects of the present invention can also be realized by a computer of a system or apparatus (or devices such as a CPU or MPU) that reads out and executes a program recorded on a memory device to perform the functions of the above-described embodiments, and by a method, the steps of which are performed by a computer of a system or apparatus by, for example, reading out and executing a program recorded on a memory device to perform the functions of the above-described embodiments.
- the program is provided to the computer for example via a network or from a recording medium of various types serving as the memory device (e.g., computer-readable storage medium).
- the system or apparatus, and the recording medium where the program is stored are included as being within the scope of the present invention.
Abstract
Description
- 1. Field of the Invention
- The present invention relates to an information processing apparatus, a method for controlling an information processing apparatus, and a program.
- 2. Description of the Related Art
- Some information processing apparatuses have a normal mode and a power saving mode as a power mode, and operate in either power mode according to a situation. For such information processing apparatuses, it is important to increase the time period for which the information processing apparatus can operate in the power saving mode as much as possible to keep power consumption low.
- Japanese Patent Application Laid-Open No. 2006-270538 discusses an invention relating to an information processing apparatus constituted by an apparatus main body and a network interface card (NIC), and configured in such a manner that power is supplied to the apparatus main body and the NIC in the normal mode, while power is supplied only to the NIC but is not supplied to the apparatus main body in the power saving mode. In this information processing apparatus, when a job is input during the power saving mode, the NIC performs proxy response processing, thereby maintaining the power saving mode of the information processing apparatus as long as possible.
- The proxy response processing here means that, when a job is input during the power saving mode and this job is not required to be directly processed by the apparatus main body, the NIC processes this job on behalf of the apparatus main body while maintaining the power saving mode of the information processing apparatus. When a job is input during the power saving mode and this job is required to be directly processed by the apparatus main body, the information processing apparatus is transitioned from the power saving mode to the normal mode, thereby allowing the apparatus main body to directly process that job.
- In recent years, it has become common to encrypt a job when the job is transmitted or received between a plurality of apparatuses for security reasons. If an encrypted job is input into and is processed by the information processing apparatus discussed in Japanese Patent Application Laid-Open No. 2006-270538, the following problem arises.
- To apply proxy response processing to the encrypted job, the NIC side should decrypt the job first, and then perform proxy response processing. In this case, it can take a long time to decrypt the entire job, which inevitably leads to a delay in execution of proxy response processing. This problem becomes more noticeable when the decrypting capability of the NIC side is lower than the decrypting capability of the apparatus main body side.
- One aspect of the present invention is directed to enabling proxy response processing perform processing more quickly on an encrypted job.
- According to an aspect of the present invention, an information processing apparatus includes a first processing unit and a second processing unit. The information processing apparatus operates in a first power mode in which power is supplied to the first processing unit and the second processing unit, or in a second power mode in which power is not supplied to the first processing unit but is supplied to the second processing unit. The information processing apparatus includes an input unit configured to, when the information processing apparatus operates in the second power mode, input a job, a decryption unit configured to, when the input unit inputs an encrypted job, decrypt a header of the encrypted job without decrypting a main body of the encrypted job, a determination unit configured to determine whether the second processing unit should perform proxy response processing based on the header of the job, and a control unit configured to, in a case where the determination unit determines that the second processing unit should perform the proxy response processing, perform control such that the second processing unit processes the job input by the input unit without causing the information processing apparatus to transition from the second power mode to the first power mode, and configured to, in a case where the determination unit determines that the second processing unit should not perform the proxy response processing, perform control such that the first processing unit processes the job input by the input unit after causing the information processing apparatus to transition from the second power mode to the first power mode.
- Further features and aspects of the present invention will become apparent from the following detailed description of exemplary embodiments with reference to the attached drawings.
- The accompanying drawings, which are incorporated in and constitute a part of the specification, illustrate exemplary embodiments, features, and aspects of the invention and, together with the description, serve to explain the principles of the invention.
-
FIG. 1 illustrates a system configuration. -
FIG. 2 is a block diagram illustrating the configuration of a multi-function peripheral (MFP) 2. -
FIG. 3 is a flowchart illustrating processing to be performed by theMFP 2. -
FIG. 4 is a flowchart illustrating the details of proxy response processing according to a first exemplary embodiment. -
FIG. 5 illustrates a data structure of a job. -
FIG. 6 is a table storing the correspondence relationship between job types and availability of the proxy response processing. -
FIG. 7 is a flowchart illustrating the details of proxy response processing according to a second exemplary embodiment. -
FIG. 8 is a flowchart illustrating the details of proxy response processing according to a third exemplary embodiment. - Various exemplary embodiments, features, and aspects of the invention will be described in detail below with reference to the drawings.
- In the following description, an information processing apparatus is embodied by an MFP by way of example, but the information processing apparatus may be embodied by an apparatus that is not an MFP. Further, in the following description, an NIC is provided within the MFP, but the NIC may be provided outside the MFP.
- A first exemplary embodiment will be described.
FIG. 1 illustrates a system configuration of the present exemplary embodiment. - A system includes a personal computer (PC) 1, an
MFP 2, and a local area network (LAN) 3. The PC 1 generates a job, and then outputs the job to theMFP 2. TheMFP 2 inputs a job from the PC 1, and then processes the job. TheLAN 3 connects the PC 1 and the MFP 2 communicably to each other. -
FIG. 2 is a block diagram illustrating the configuration of theMFP 2. InFIG. 2 , the solid line indicates a data flow, and the broken line indicates a power flow. - The MFP 2 includes an NIC 100, an apparatus
main body 200, and apower source 300. The NIC 100 includes components from aLAN interface 101 to asystem bus 107. TheLAN interface 101 inputs data from and outputs data to theLAN 3. A central processing unit (CPU) 102 (second processing unit) is in charge of control of theentire NIC 100. To realize this control, theCPU 102 reads out a program stored in a read only memory (ROM) 106 into a random access memory (RAM) 103, and then executes the program. TheRAM 103 functions as, for example, a work area when theCPU 102 processes a job. An input/output (I/O)interface 104 inputs data from and outputs data into the apparatusmain body 200. - A Mini Security Architecture for Internet Protocol (IP-Sec) 105 encrypts and decrypts data according to the IP-Sec method. The present exemplary embodiment will be described assuming that the Mini IP-Sec 105 is a hardware apparatus, but the Mini IP-Sec 105 may be a program described as a software application, and may be realized when the
CPU 102 executes the program. TheROM 106 stores, for example, a program to be executed by theCPU 102. Thesystem bus 107 connects the respective components of the NIC 100 to one another. - The apparatus
main body 200 includes components from an I/O interface 201 to asystem bus 210. The I/O interface 201 inputs data from and outputs data into theNIC 100. A CPU 202 (first processing unit) is in charge of control of the entire apparatusmain body 200. To realize this control, theCPU 202 reads out a program stored in aROM 207 or a hard disc drive (HDD) 204 into aRAM 203, and then executes the program. - The
RAM 203 functions as, for example, a work area when theCPU 202 processes a job. The HDD 204 stores, for example, an operating system (OS) and an application program that theCPU 202 executes. Further, theHDD 204 can also hold image data input by theLAN interface 101 and areading unit 208, and this image data can be output according to a user's instruction. A certain area in the storage area of the HDD 204 is designated to hold image data for a while, and this area is referred to as “BOX”. Further, the function of storing image data into the BOX or outputting image data selected by a user from the image data stored in the BOX is referred to as “BOX function”. - An
operation unit 205 includes a display unit and an input unit. Theoperation unit 205 provides an operation screen of theMFP 2 to a user with use of the display unit, and receives various kinds of operations that a user applies to theMFP 2 with use of the input unit. - A Full IP-
Sec 206 encrypts and decrypts data according to the IP-Sec method. The Full IP-Sec 2006 can encrypt and decrypt data more quickly than the Mini IP-Sec 105 does. Further, the Full-IP-Sec 206 consumes a larger amount of power than the Mini IP-Sec 105. Further, the Full IP-Sec 206 supports a wider range of encryption and decryption methods than the Mini IP-Sec 105. - The present exemplary embodiment will be described assuming that the Full IP-
Sec 206 is a hardware apparatus, but the Full IP-Sec 206 may be a program described as a software application, and may be realized when theCPU 202 executes the program. TheROM 207 stores, for example, a boot program to be executed by theCPU 202. - The
reading unit 208 reads a document to input image data and stores the image data into theRAM 203. Aprinting unit 209 prints data onto a sheet based on image data stored in theRAM 203. - A
system bus 210 connects the respective components of the apparatusmain body 200 to one another. Apower source 300 supplies power to theNIC 100 and the apparatusmain body 200. Thepower source 300 switches the operation mode of theMFP 2 between a normal mode and a power saving mode according to the control of theCPU 102 and theCPU 202. -
FIG. 3 is a flowchart illustrating the processing performed by theMFP 2. The processing illustrated inFIG. 3 is executed by theCPU 202 when theMFP 2 operates mainly in the normal mode. TheCPU 202 reads out the program stored in theHDD 204 into theRAM 203 to execute the program, so that the processing illustrated inFIG. 3 is realized. - First, in step S101, the
CPU 202 activates theMFP 2 when theCPU 202 receives an instruction to turn the power on from a user via theoperation unit 205. Upon completion of the activation, theMFP 2 starts operating in the normal mode. In the present exemplary embodiment, theMFP 2 operates in any of a plurality of power modes. Examples of the plurality of power modes include the normal mode (first power mode) and the power saving mode (second power mode). The normal mode is a power mode in which power is supplied to both theNIC 100 and the apparatusmain body 200. - The power saving mode is a power mode in which power consumption is low compared to the normal mode, and power is supplied to the
NIC 100 but is not supplied to the apparatusmain body 200. Further, as the power saving mode, there may be a power mode in which power supply is stopped to only a part of the apparatus main body 200 (theoperation unit 205, thereading unit 208, and the printing unit 209), and power supply is continued to the rest of the apparatusmain body 200. In the present embodiment, the expression “power is not supplied” should be interpreted in abroad sense, and is intended to cover not only the condition that no power is supplied power, but also the condition that the supplied power is too low to allow execution of a normal operation. - Subsequently, in step S102, the
CPU 202 determines whether a job is input via the I/O interface 201. If a job is input (YES in step S102), the processing proceeds to step S103. If no job is input (NO in step S102), the processing proceeds to step S107. - If the determination result is YES in step S102, in step S103, the
CPU 202 determines whether the job input in step S102 is encrypted. If the input job is encrypted (YES in step S103), the processing proceeds to step S104. If the input job is not encrypted (NO in step S103), the processing proceeds to step S105. - Subsequently, in step S104, the
CPU 202 decrypts the job input in step S102 by controlling the Full IP-Sec 206. For an input job entirely encrypted, the Full IP-Sec 206 entirely decrypts the input job. For an input job partially encrypted, the Full IP-Sec 206 partially decrypts the input job. - Subsequently, in step S105, the
CPU 202 processes the job input in step S102. At this time, theCPU 202 performs the processing according to the type of the input job. - Subsequently, in step S106, the
CPU 202 determines whether theCPU 202 has received an instruction to turn the power off from the user via theoperation unit 205. If theCPU 202 has received an instruction to turn the power off from the user (YES in step S106), the processing ends. If theCPU 202 has not received an instruction to turn the power off from the user (NO in step S106), the processing proceeds to step S102. - If the determination result is NO in step S102, in step S107, the
CPU 202 determines whether a predetermined time has passed, maintaining such a state that no job is input via theLAN interface 101. Alternatively, in step S107, instead of making the above-described determination, theCPU 202 determines whether theCPU 202 has received an instruction to cause theMFP 207 to transit to the power saving mode from the user via theoperation unit 205. If the predetermined time has passed, maintaining such a state that no job is input (YES in step S107), the processing proceeds to step S108. If the predetermined time has not passed, maintaining such a stat that no job is input (NO in step S107), the processing proceeds to step S102. - Subsequently, in step S108, the
CPU 202 controls thepower source 300 to cause theMFP 2 transition from the normal mode to the power saving mode. In step S109, during the power saving mode, theNIC 100 performs proxy response processing. The proxy response processing means that theCPU 102 responds to a job on behalf of theCPU 202 while theMFP 2 is operating in the power saving mode. The details of step S109 is described below with reference toFIG. 4 . - Subsequently, in step S110, the
CPU 202 determines whether theCPU 202 has received an activation signal from theCPU 102 via the I/O interface 201. The activation signal is a signal transmitted from theCPU 102 to theCPU 202, and a signal for causing theMFP 2 to transition from the power saving mode to the normal mode. It should be noted that, immediately before theCPU 202 receives an activation signal, theCPU 102 controls thepower source 300, thereby arranging power to be supplied to at least theCPU 202. Alternatively, in step S110, instead of making the above-described determination, theCPU 202 determines whether theCPU 202 has received an instruction to cause theMFP 2 to transition to the normal mode from the user via theoperation unit 205. If theCPU 202 has received an activation signal from the CPU 102 (YES in step S110), the processing proceeds to step S111. If theCPU 202 has not received an activation signal from the CPU 102 (NO in step S110), the processing proceeds to step S109. - Subsequently, in step S111, the
CPU 202 controls thepower source 300 to cause theMFP 2 to transition from the power saving mode to the normal mode. The processing of causing theMFP 2 to transition from the power saving mode to the normal mode includes, for example, the processing that theCPU 202 activates the respective components of the apparatusmain body 202. -
FIG. 4 is a flowchart illustrating the details of the proxy response processing according to the first exemplary embodiment. The processing illustrated inFIG. 4 is performed by theCPU 102 when theMFP 2 operates mainly in the power saving mode. TheCPU 102 reads out the program stored in theROM 106 into theRAM 103 to execute the program, so that the processing illustrated inFIG. 4 is realized. - First, in step S201, the
CPU 102 determines whether a job is input via theLAN interface 101. If a job is input (YES in step S201), the processing proceeds to step S202. If no job is input (NO in step S201), theCPU 102 waits until a job is input. - Subsequently, in step S202, the
CPU 102 determines whether the job input in step S201 is encrypted. If the input job is encrypted (YES in step S202), the processing proceeds to step S203. If the input job is not encrypted (NO in step S202), the processing proceeds to step 209. - If the determination result is YES in step S202 in step S203, the
CPU 102 controls the Mini IP-Sec 105 to decrypt the header of the job input in step S201. At this time, the Mini IP-Sec 105 does not decrypt the main body of the job. Further, at this time, the header of the job is copied to the Mini IP-Sec 105, which then decrypts this copy. Therefore, the original header of the job remains encrypted. -
FIG. 5 illustrates a data structure of a job. A job includes a header and a main body. The header contains, for example, information indicating the type of the job, and the main body contains, for example, image data required to execute the job. The header has a fixed data length, while the main body has a variable data length. In step S203, the Mini IP-Sec 105 decrypts data from the beginning of the job to the position corresponding to a predetermined data length, thereby decrypting the header of the job. - Subsequently, in step S204, the
CPU 102 determines whether the job input in step S201 is a job that theNIC 100 can respond to by proxy based on the information indicating the type of the job, which is contained in the header of the job decrypted in step S203. If the input job is a job that theNIC 100 can respond to by proxy (YES in step S204), the processing proceeds to step S205. If the input job is not a job that theNIC 100 can respond to by proxy (NO in step S204), the processing proceeds to step S207. - In the present exemplary embodiment, the
MFP 2 can process a plurality of types of jobs. Examples of the plurality of types of jobs, especially, examples of jobs input from thePC 1 to theMFP 2, include an apparatus status check, a network connection response, Page Description Language (PDL) printing, and BOX remote access. The apparatus status check job is where theMFP 2 reports the current status of the MFP 2 (for example, presence or absence of an error, the remaining amount of toner, and the remaining amount of sheets) to thePC 1 in response to a request from thePC 1. The network connection response job is where theMFP 2 notifies thePC 1 that theMFP 2 is connected to theLAN 3 at that time in response to a request from thePC 1. The PDL printing job is where theMFP 2 controls theprinting unit 209 to print data based on print data in the PDL format which is input from thePC 1. - The BOX remote access job is where the BOX is accessed by a remote operation from the
PC 1. Examples of jobs that remotely access the BOX include a job of storing image data into the BOX according to a remote operation from thePC 1, and a job of printing data based on image data stored in the BOX according to a remote operation from thePC 1. -
FIG. 6 is a table indicating the correspondence relationship between job types and availability of proxy response processing. This table is stored in theROM 106, and can be used by theCPU 102. For example, the apparatus status check and network connection response jobs can be processed without use of the components of the apparatusmain body 200, and thereby allow theNIC 100 to take care of them by proxy response processing. - Further, for example, the PDL printing and BOX remote access jobs cannot be processed without use of the components of the apparatus
main body 200, and thereby do not allow theNIC 100 to take care of them by proxy response processing. In step S204, theCPU 102 refers to the table illustrated inFIG. 6 to specify availability of proxy response processing from the job type, and thereby determines whether the input job is a job that theNIC 100 can respond to by proxy response processing. - If the determination result is YES in step S204, in step S205, the
CPU 102 controls the Mini IP-Sec 105 to decrypt the main body of the job input in step S201. At this time, theCPU 102 does not decrypt the header of the input job. - Subsequently, in step S206, the
CPU 102 processes the job input in step S201. At this time, theCPU 102 performs the processing according to the type of the input job based on the information indicating the job type which is contained in the job header decrypted in step S203. Further, at this time, theCPU 102 processes the input job with use of the data contained in the job main body decrypted in step S205. - If the determination result is NO in step S204, in step S207, the
CPU 102 transmits an activation signal to theCPU 202 via the I/O interface 104. - Subsequently, in step S208, the
CPU 102 transmits the job input in step S201 to the apparatusmain body 200 via the I/O interface 104. In the present exemplary embodiment, in step S208, theCPU 102 does not overwrite the header and main body of the job with the decrypted data, and therefore both the header and main body of the job transmitted to the apparatusmain body 200 are data remaining encrypted. - If the determination result is NO in step S202, in step S209, the
CPU 102 determines whether the job input in step S201 is a job that theNIC 100 can respond to by proxy response processing based on the information indicating the job type contained in the header of the job input in step S201. In step S209, theCPU 102 also refers to the table illustrated inFIG. 6 to specify availability of proxy response processing from the job type, and thereby determines whether the input job is a job that theNIC 100 can respond to by proxy response processing. If the input job is a job that theNIC 100 can respond to by proxy response processing (YES in step S209), the processing proceeds to step S210. If the input job is not a job that theNIC 100 can respond to by proxy response processing (NO in step S209), the processing proceeds to step S211. - If the determination result is YES in step S209, in step S210, the
CPU 102 processes the job input in step S201. At this time, theCPU 102 performs the processing according to the type of the input job based on the information indicating the job type, which is contained in the header of the job input in step S201. Further, at this time, theCPU 102 processes the input job with use of the data contained in the main body of the job input in step S201. - If the determination result is NO in step S209, in step S211, the
CPU 102 transmits an activation signal to theCPU 202 via the I/O interface 104. - Subsequently, in step S212, the
CPU 102 transmits the job input in step S201 to the apparatusmain body 200 via the I/O interface 104. Step S212 is performed after theCPU 202 has completed its activation in response to the activation signal. Further, in the job data transmitted to the apparatusmain body 200 in step S212, both the header and main body are unencrypted data. - According to the present exemplary embodiment, when an encrypted job is input while the
MFP 2 is operating in the power saving mode, theNIC 100 decrypts only the header of the job to determine availability of proxy response processing. As a result, theNIC 100 can perform proxy response processing on the encrypted job at a higher speed and with a lighter processing load, compared to the processing speed and load when theNIC 100 decrypts the entire job to determine availability of proxy response processing. - A second exemplary embodiment will now be described. According to the first exemplary embodiment, in step S208, the
NIC 100 transmits a job containing both the header and main body remaining encrypted to the apparatusmain body 200. - According to the second exemplary embodiment, in step S208, the
NIC 100 transmits a job in which the header is decrypted and the main body remains encrypted, to the apparatusmain body 200. - The basic configuration of the present exemplary embodiment is similar to the first exemplary embodiment described with reference to
FIGS. 1 to 6 , and therefore the description thereof will be omitted here. -
FIG. 7 is a flowchart illustrating the details of the proxy response processing according to the second exemplary embodiment. InFIG. 7 , steps similar to those illustrated inFIG. 4 are indicated by the same step numbers, and the descriptions thereof will be omitted here. A difference betweenFIG. 7 andFIG. 4 is the addition of step S301 between step S207 and step S208. In step S301, theCPU 102 overwrites the header of the job input in step S201 with the data decrypted in step S203. As a result of the execution of step S301, in step S208, theCPU 102 outputs the job data with only the header thereof decrypted. Therefore, in step S104, theCPU 202 only has to decrypt the main body of the job. - Alternatively, the present exemplary embodiment may be configured in such a manner that overwriting the header of a job is performed only when the time required to cause the
MFP 2 to transit from the power saving mode to the normal mode is longer than the time required to overwrite the header of the job. In this case, the time required for theMFP 2 to transition from the power saving mode to the normal mode, and the time required to overwrite the header of the job are stored in advance or estimated each time. - According to the present exemplary embodiment, when an encrypted job is input while the
MFP 2 is operating in the power saving mode, and theMFP 2 transitions to the normal mode, the job transmitted from theNIC 100 to the apparatusmain body 200 already has a decrypted header. As a result, according to the present exemplary embodiment, theCPU 202 does not have to decrypt the header of the job after theMFP 2 transitions to the normal mode, so that theCPU 202 can process the job at a higher speed and with a lighter processing load compared to the first exemplary embodiment. - A third exemplary embodiment will now be described. According to the first exemplary embodiment, in step S208, the
NIC 100 transmits a job with both the header and main body thereof remaining encrypted to the apparatusmain body 200. - According to the third exemplary embodiment, in step S208, the
NIC 100 transmits a job in which both the header and the main body are decrypted to the apparatusmain body 200. The basic configuration of the present exemplary embodiment is similar to the first exemplary embodiment described with reference toFIGS. 1 to 6 , and therefore the description thereof will be omitted here. -
FIG. 8 is a flowchart illustrating the details of the proxy response processing according to the third exemplary embodiment. InFIG. 8 , steps similar to those inFIG. 4 are indicated by the same step numbers, and the descriptions thereof will be omitted here. A difference betweenFIG. 8 andFIG. 4 is the addition of steps S401 and S402 between steps S207 and S208. - First, in step S401, the
CPU 102 controls the Mini IP-Sec 105 to decrypt the main body of the job input in step S201. At this time, the main body of the job is copied to the Mini IP-Sec 105, which then decrypts this copy. Therefore, the original main body of the job remains encrypted. - Subsequently, in step S402, the
CPU 102 overwrites the header of the job input in step S201 with the data decrypted in step S203, and overwrites the main body of the job input in step S201 with the data decrypted in step S401. As a result of the execution of step S402, in step S208, theCPU 102 outputs the job data with both the header and main body thereof decrypted. Therefore, in step S104, theCPU 202 does not have to decrypt the job. - Alternatively, the present exemplary embodiment may be configured in such a manner that decrypting and overwriting the main body of a job is performed only when the time required for the
MFP 2 to transition from the power saving mode to the normal mode is longer than the time required to decrypt and overwrite the main body of the job. In this case, the time required for theMFP 2 to transition from the power saving mode to the normal mode, and the time required to decrypt and overwrite the main body of the job are stored in advance or estimated each time. - According to the present exemplary embodiment, when an encrypted job is input while the
MFP 2 is operating in the power saving mode, and theMFP 2 transitions to the normal mode, the job transmitted from theNIC 100 to the apparatusmain body 200 already has a decrypted header and main body. As a result, according to the present exemplary embodiment, theCPU 202 does not have to decrypt the header and main body of the job after the power mode of theMFP 2 is caused to transit to the normal mode, so that theCPU 202 can process the job at a higher speed and with a lighter processing load compared to the first exemplary embodiment. - Aspects of the present invention can also be realized by a computer of a system or apparatus (or devices such as a CPU or MPU) that reads out and executes a program recorded on a memory device to perform the functions of the above-described embodiments, and by a method, the steps of which are performed by a computer of a system or apparatus by, for example, reading out and executing a program recorded on a memory device to perform the functions of the above-described embodiments. For this purpose, the program is provided to the computer for example via a network or from a recording medium of various types serving as the memory device (e.g., computer-readable storage medium). In such a case, the system or apparatus, and the recording medium where the program is stored, are included as being within the scope of the present invention.
- While the present invention has been described with reference to exemplary embodiments, it is to be understood that the invention is not limited to the disclosed exemplary embodiments. The scope of the following claims is to be accorded the broadest interpretation so as to encompass all modifications, equivalent structures, and functions.
- This application claims priority from Japanese Patent Application No. 2011-056603 filed Mar. 15, 2011, which is hereby incorporated by reference herein in its entirety.
Claims (7)
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
JP2011056603A JP5818470B2 (en) | 2011-03-15 | 2011-03-15 | Information processing apparatus, information processing apparatus control method, and program |
JP2011-056603 | 2011-03-15 |
Publications (2)
Publication Number | Publication Date |
---|---|
US20120236347A1 true US20120236347A1 (en) | 2012-09-20 |
US9030680B2 US9030680B2 (en) | 2015-05-12 |
Family
ID=46828217
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US13/418,249 Expired - Fee Related US9030680B2 (en) | 2011-03-15 | 2012-03-12 | Information processing apparatus, method for controlling information processing apparatus, and program |
Country Status (2)
Country | Link |
---|---|
US (1) | US9030680B2 (en) |
JP (1) | JP5818470B2 (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20140293342A1 (en) * | 2013-04-01 | 2014-10-02 | Kyocera Document Solutions Inc. | Image processing system and image processing apparatus |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20030212886A1 (en) * | 2002-05-09 | 2003-11-13 | Nec Corporation | Encryption/decryption system and encryption/decryption method |
US20060101109A1 (en) * | 2003-05-12 | 2006-05-11 | Canon Kabushiki Kaisha | Network service system, service proxy processing method, computer-readable storage medium storing program, and program therefor |
US20080091736A1 (en) * | 2006-10-13 | 2008-04-17 | Konica Minolta Business Technologies, Inc. | Data management system and data management method |
US20100235619A1 (en) * | 2009-03-13 | 2010-09-16 | Canon Kabushiki Kaisha | Image processing apparatus, communication system, control method thereof, and storage medium |
Family Cites Families (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6862583B1 (en) * | 1999-10-04 | 2005-03-01 | Canon Kabushiki Kaisha | Authenticated secure printing |
JP2006259906A (en) * | 2005-03-15 | 2006-09-28 | Ricoh Co Ltd | Communication control device, communication control system, power saving control method, power saving control program and recording medium recording program |
JP2006270538A (en) | 2005-03-24 | 2006-10-05 | Canon Inc | Network device, recovery method from power saving state, and recording medium |
JP2007036834A (en) * | 2005-07-28 | 2007-02-08 | Canon Inc | Encryption apparatus, program, recording medium, and method |
JP5377009B2 (en) * | 2009-03-13 | 2013-12-25 | キヤノン株式会社 | Information processing apparatus, communication system, information processing apparatus control method, and program |
-
2011
- 2011-03-15 JP JP2011056603A patent/JP5818470B2/en not_active Expired - Fee Related
-
2012
- 2012-03-12 US US13/418,249 patent/US9030680B2/en not_active Expired - Fee Related
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20030212886A1 (en) * | 2002-05-09 | 2003-11-13 | Nec Corporation | Encryption/decryption system and encryption/decryption method |
US20060101109A1 (en) * | 2003-05-12 | 2006-05-11 | Canon Kabushiki Kaisha | Network service system, service proxy processing method, computer-readable storage medium storing program, and program therefor |
US20080091736A1 (en) * | 2006-10-13 | 2008-04-17 | Konica Minolta Business Technologies, Inc. | Data management system and data management method |
US20100235619A1 (en) * | 2009-03-13 | 2010-09-16 | Canon Kabushiki Kaisha | Image processing apparatus, communication system, control method thereof, and storage medium |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20140293342A1 (en) * | 2013-04-01 | 2014-10-02 | Kyocera Document Solutions Inc. | Image processing system and image processing apparatus |
US8958087B2 (en) * | 2013-04-01 | 2015-02-17 | Kyocera Document Solutions Inc. | Image processing system and image processing apparatus |
Also Published As
Publication number | Publication date |
---|---|
JP2012192554A (en) | 2012-10-11 |
JP5818470B2 (en) | 2015-11-18 |
US9030680B2 (en) | 2015-05-12 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US8949641B2 (en) | Information processing apparatus and method for controlling information processing apparatus restoration order of images that reduces the waiting time when restoration from a hibernation state | |
US8893305B2 (en) | Access restricted file and access restricted file creating | |
JP2008210106A (en) | Print processing execution device, history information processing method, program and recording medium | |
JP6440630B2 (en) | Image forming method | |
JP2008030287A (en) | Printing apparatus, printing system and program | |
US8390848B2 (en) | Information processing apparatus and secured printing system for preventing a data leakage | |
US9042547B2 (en) | Image forming apparatus | |
JP2009253810A (en) | Image processing device, and method for controlling image processing device | |
JP2013165343A (en) | Image forming device, image forming method, and program | |
JP5760441B2 (en) | Printing control program, information processing apparatus, printing system, and printing apparatus | |
JP2008238676A (en) | Image forming system, setting information managing program, and recording medium | |
JP2009025928A (en) | Encrypted data processing method, encrypted data processing program, and encrypted data processor | |
JP4532937B2 (en) | PRINT SYSTEM, ITS CONTROL METHOD, PRINT FUNCTION SPECIFICATION METHOD, COMPUTER DEVICE, COMPUTER PROGRAM, AND STORAGE MEDIUM | |
US9030680B2 (en) | Information processing apparatus, method for controlling information processing apparatus, and program | |
JP5294795B2 (en) | Print control apparatus, print control method, and computer program | |
JP6256417B2 (en) | PRINT CONTROL DEVICE, PROGRAM, AND PRINT SYSTEM | |
JP2007317058A (en) | Information processor | |
JP2011063027A (en) | Network printer | |
JP2010097350A (en) | Printing system, printer driver and printer | |
JP5239482B2 (en) | Communication apparatus, program, and image forming apparatus | |
JPH0965148A (en) | Picture processing system and picture output method | |
JP2012038076A (en) | Information processing device, job processing system, job transmission path control method and program, and recording medium | |
JP2004336672A (en) | Image output system, image data transmitting program, and image output apparatus | |
JP2009075451A (en) | Image forming device | |
JP2013129092A (en) | Image forming apparatus |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AS | Assignment |
Owner name: CANON KABUSHIKI KAISHA, JAPAN Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:UMEDA, YOSHINOBU;REEL/FRAME:028406/0123 Effective date: 20120228 |
|
STCF | Information on status: patent grant |
Free format text: PATENTED CASE |
|
FEPP | Fee payment procedure |
Free format text: MAINTENANCE FEE REMINDER MAILED (ORIGINAL EVENT CODE: REM.); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY |
|
LAPS | Lapse for failure to pay maintenance fees |
Free format text: PATENT EXPIRED FOR FAILURE TO PAY MAINTENANCE FEES (ORIGINAL EVENT CODE: EXP.); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY |
|
STCH | Information on status: patent discontinuation |
Free format text: PATENT EXPIRED DUE TO NONPAYMENT OF MAINTENANCE FEES UNDER 37 CFR 1.362 |
|
FP | Lapsed due to failure to pay maintenance fee |
Effective date: 20190512 |